Welcome to another installment of Model's approach to Unified Endpoint Management. This is part of a series of posts and videos we've done about our...
Deploying Updates Efficiently & With Empathy | Updates And Servicing (Level 5)
Welcome to another installment of our Maturity Model series. In this post, we'll briefly cover the Maturity Model phases and categories, and what...
How To Convert Your Cloud Management Gateway to a Virtual Machine Scale Set
When Microsoft introduced the Cloud Management Gateway (CMG) for Microsoft Endpoint Configuration Manager (MECM), there was only one supported...
The Biggest Mindset Shift You Can Make To Improve Security
My name is Jason Rutherford, and I'm the Managing Partner of Model Technology Solutions. The last two years have shifted the landscape of Endpoint...
Efficient and Intuitive | Application Management (Level 5)
Welcome to Model's approach to Unified Endpoint Management Application Management Level 5. This is part of the Maturity Model series on Unified...
All Recent Posts
Virtual CISOs: A Strategic Asset for Meeting Legal Cybersecurity Benchmarks
If you’re a managing partner, principal, or senior IT staff at a law firm, an intentional,...
How Law Firms Can Use AI Tools & vCISO Platforms To Mitigate Emerging Threats
As a managing partner, principal, or senior IT staff at a law firm, you’re a prime target for...
Generative AI Implications for Law Firms
You’re a managing partner, principal, or senior IT staff at a law firm. Your team is starting to...
Paying high cyber-insurance premiums?
Prove you’re cyber-ready and reduce your premiums through our NIST-based cybersecurity assessment. Then make the most of your assessment results through monthly consulting sessions with our vCISO Director of Cybersecurity.